Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (25)
  • Open Access

    ARTICLE

    Spatio-Temporal Wind Speed Prediction Based on Variational Mode Decomposition

    Yingnan Zhao1,*, Guanlan Ji1, Fei Chen1, Peiyuan Ji1, Yi Cao2

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 719-735, 2022, DOI:10.32604/csse.2022.027288

    Abstract Improving short-term wind speed prediction accuracy and stability remains a challenge for wind forecasting researchers. This paper proposes a new variational mode decomposition (VMD)-attention-based spatio-temporal network (VASTN) method that takes advantage of both temporal and spatial correlations of wind speed. First, VASTN is a hybrid wind speed prediction model that combines VMD, squeeze-and-excitation network (SENet), and attention mechanism (AM)-based bidirectional long short-term memory (BiLSTM). VASTN initially employs VMD to decompose the wind speed matrix into a series of intrinsic mode functions (IMF). Then, to extract the spatial features at the bottom of the model, each IMF employs an improved convolutional… More >

  • Open Access

    ARTICLE

    Multi-Level Knowledge Engineering Approach for Mapping Implicit Aspects to Explicit Aspects

    Jibran Mir1, Azhar Mahmood2,*, Shaheen Khatoon3

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3491-3509, 2022, DOI:10.32604/cmc.2022.019952

    Abstract Aspect's extraction is a critical task in aspect-based sentiment analysis, including explicit and implicit aspects identification. While extensive research has identified explicit aspects, little effort has been put forward on implicit aspects extraction due to the complexity of the problem. Moreover, existing research on implicit aspect identification is widely carried out on product reviews targeting specific aspects while neglecting sentences’ dependency problems. Therefore, in this paper, a multi-level knowledge engineering approach for identifying implicit movie aspects is proposed. The proposed method first identifies explicit aspects using a variant of BiLSTM and CRF (Bidirectional Long Short Memory-Conditional Random Field), which serve… More >

  • Open Access

    ARTICLE

    Binaural Speech Separation Algorithm Based on Deep Clustering

    Lin Zhou1,*, Kun Feng1, Tianyi Wang1, Yue Xu1, Jingang Shi2

    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 527-537, 2021, DOI:10.32604/iasc.2021.018414

    Abstract Neutral network (NN) and clustering are the two commonly used methods for speech separation based on supervised learning. Recently, deep clustering methods have shown promising performance. In our study, considering that the spectrum of the sound source has time correlation, and the spatial position of the sound source has short-term stability, we combine the spectral and spatial features for deep clustering. In this work, the logarithmic amplitude spectrum (LPS) and the interaural phase difference (IPD) function of each time frequency (TF) unit for the binaural speech signal are extracted as feature. Then, these features of consecutive frames construct feature map,… More >

  • Open Access

    ARTICLE

    Steganalysis of Low Embedding Rate CNV-QIM in Speech

    Wanxia Yang*, Miaoqi Li, Beibei Zhou, Yan Liu, Kenan Liu, Zhiyu Hu

    CMES-Computer Modeling in Engineering & Sciences, Vol.128, No.2, pp. 623-637, 2021, DOI:10.32604/cmes.2021.015629

    Abstract To address the difficulty of detecting low embedding rate and high-concealment CNV-QIM (complementary neighbor vertices-quantization index modulation) steganography in low bit-rate speech codec, the code-word correlation model based on a BiLSTM (bi-directional long short-term memory) neural network is built to obtain the correlation features of the LPC codewords in speech codec in this paper. Then, softmax is used to classify and effectively detect low embedding rate CNV-QIM steganography in VoIP streams. The experimental results show that for speech steganography of short samples with low embedding rate, the BiLSTM method in this paper has a superior detection accuracy than state-of-the-art methods… More >

  • Open Access

    ARTICLE

    A Hybrid Method of Coreference Resolution in Information Security

    Yongjin Hu1, Yuanbo Guo1, Junxiu Liu2, Han Zhang3, *

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1297-1315, 2020, DOI:10.32604/cmc.2020.010855

    Abstract In the field of information security, a gap exists in the study of coreference resolution of entities. A hybrid method is proposed to solve the problem of coreference resolution in information security. The work consists of two parts: the first extracts all candidates (including noun phrases, pronouns, entities, and nested phrases) from a given document and classifies them; the second is coreference resolution of the selected candidates. In the first part, a method combining rules with a deep learning model (Dictionary BiLSTM-Attention-CRF, or DBAC) is proposed to extract all candidates in the text and classify them. In the DBAC model,… More >

Displaying 21-30 on page 3 of 25. Per Page